يعرض 61 - 80 نتائج من 238 نتيجة بحث عن '(( relevant data algorithm ) OR ((( data code algorithm ) OR ( based making algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 61

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer حسب Hibah Shaath (5599658)

    منشور في 2021
    "…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …"
  2. 62

    New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n) حسب Gutub, Adnan

    منشور في 2002
    "…We compare all scalable designs with fully parallel ones based on the same basic inversion algorithm. All scalable designs consumed less area and in general showed better performance than the fully parallel ones, which makes the scalable design a very efficient solution for computing the long precision Montgomery inverse.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  3. 63

    Logistics Optimization Using Hybrid Genetic Algorithm (HGA): A Solution to the Vehicle Routing Problem With Time Windows (VRPTW) حسب Ayesha Maroof (17984053)

    منشور في 2024
    "…Experimental findings validate that HGA-SIH consistently delivers results on par with or surpasses those obtained by several cutting-edge algorithms when evaluated based on various solution quality metrics. …"
  4. 64

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data حسب Rajesh Kumar Dhanaraj (19646269)

    منشور في 2021
    "…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …"
  5. 65
  6. 66
  7. 67

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT حسب Arumugam K (18456690)

    منشور في 2021
    "…Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. …"
  8. 68

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval حسب Mohammed Tahar Habib Kaib (21633176)

    منشور في 2024
    "…In this paper, the proposed algorithm selects relevant observations from the original data set by utilizing a class interval technique (i.e. histogram) to maintain a bunch of representative samples from each bin. …"
  9. 69

    Reinforced steering Evolutionary Markov Chain for high-dimensional feature selection حسب Atiq ur Rehman (3044409)

    منشور في 2024
    "…<p>The increasing accessibility of extensive datasets has amplified the importance of extracting insights from high-dimensional data. However, the task of selecting relevant features in these high-dimensional spaces is made more difficult due to the curse of dimensionality. …"
  10. 70
  11. 71
  12. 72

    Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering حسب Saadia Jamil (22045946)

    منشور في 2024
    "…It calculates the dimension relevance with various data instances. These further place the relevant dimension samples in one group. …"
  13. 73

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services حسب ALBARGHOTHI, ALI BAHA’EDDIN

    منشور في 2018
    "…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …"
    احصل على النص الكامل
  14. 74
  15. 75

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …"
  16. 76

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform حسب Hamed Al-Shaibani (19497412)

    منشور في 2022
    "…Furthermore, to assess the overhead of the proposed privacy algorithms on the trading execution time, we conduct several experiments considering different anonymity levels <i>k</i> . …"
  17. 77

    Practical Multiple Node Failure Recovery in Distributed Storage Systems حسب Itani, M.

    منشور في 2016
    "…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  18. 78

    A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT حسب Dhananjay Bisen (19482454)

    منشور في 2023
    "…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …"
  19. 79

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations حسب Shameem A. Puthiya Parambath (14150997)

    منشور في 2022
    "…The best available recommendation algorithms are based on using the observed preference information among collaborating entities. …"
  20. 80